Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ProtectOurFreedom
Someday a password manager company is going to be hacked. They have to be the juiciest targets around.

I would never use an online password manager. That's just asking for it IMO. There are a number of good desktop programs folks can use. Password Safe was originally written by Bruce Schneier, a rather well-known cryptographer. He's since handed it off to others, but the program is still open source so anyone can see how it works, and it can therefore be validated not to have nasty surprises buried in it.

Personally, I use Keepass2, but it's a Linux program. Also open source and can read a Password Safe database. As long as you have a nicely complex and reasonably long passphrase for your password manager, you should be OK.

23 posted on 01/22/2020 8:28:32 PM PST by zeugma (I sure wish I lived in a country where the rule of law actually applied to those in power.)
[ Post Reply | Private Reply | To 8 | View Replies ]


To: zeugma
I use LastPass, so I just went back and checked how they manage passwords. They use local 256-bit AES encryption in C++ and JavaScript with one-way salted hashes on my computer. Passwords are never sent in the clear.

LastPass says this means:

1. All encryption and decryption happens on your computer.
When you create your LastPass account, an encryption key is created on your computer (your Master Password, or MP, and email go through a complex, irreversible process known as hashing to form your encryption key). Any sensitive data you then save to your account is ‘locked up’ by the encryption key while still on your computer, then sent in encrypted form to LastPass’ server.

2. The sensitive data that is harbored on our servers is always encrypted before it’s sent to us, so all we receive is gibberish.
Since the encryption key is locally created each time you submit your MP and email, all that we store and have access to on our servers is your encrypted data. Without your unique encryption key, your sensitive data is meaningless gibberish. Even if someone were to mandate that we provide a copy of our database, the data would still be unreadable without your encryption key.

3. We never receive the key to decrypt that data.

I also do two other things to make it safe: I use a long, tough passphrase AND I use two-factor authentication with a physical YubiKey.
25 posted on 01/22/2020 9:36:02 PM PST by ProtectOurFreedom
[ Post Reply | Private Reply | To 23 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson